共 40 条
[1]
Ait-Khayi N, 2019, 2019 KDD WORKSH DEEP, P1
[2]
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[3]
[Anonymous], 2014, P ICLR, DOI DOI 10.1021/CT2009208
[4]
Arjovsky M, 2017, PR MACH LEARN RES, V70
[5]
Buhagiar N, 2018, IEEE IJCNN, P1
[6]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[7]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[8]
Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
[9]
ArcFace: Additive Angular Margin Loss for Deep Face Recognition
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:4685-4694
[10]
Boosting Adversarial Attacks with Momentum
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:9185-9193